Treffer 81 - 100 von 31.369

81

J2EE Server Security Vulnerabilities Analysis Based on Java Access Permission Checking Tree
Young-Chan Lim ; Jaehyun Park ; Hyo-Seong Park ; et al.
Advanced Science and Technology Letters. :47-50

0202 electrical engineer... 1. No poverty 02 engineering and techn...
Fachzeitschrift
Zu den Favoriten
82

The Impact of Developer Experience in Using Java Cryptography
Hazhirpasand, Mohammadreza ; Ghafari, Mohammad ; Krüger, Stefan ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Zu den Favoriten
83

A systematic analysis and hardening of the Java security architecture
Holzinger, Philipp Albert ; Holzinger, Philipp Albert

E-Ressource
Zu den Favoriten
84

Towards formalizing the Java security architecture of JDK 1.2
KASSAB, L. L ; GREENWALD, S. J
Computer security (Louvain la Neuve, 16-18 September 1998)Lecture notes in computer science. :191-207

Computer science Informatique Sciences exactes et tech... Exact sciences and techn... Sciences appliquees Applied sciences
Konferenz
Zu den Favoriten
85

UMLsecRT: Reactive Security Monitoring of Java Applications with Round-Trip Engineering
Peldszus, Sven ; Bürger, Jens ; Jürjens, Jan

Java model-based development round-trip engineering runtime monitoring Security security by design
Fachzeitschrift
Zu den Favoriten
86

The evolution of Java security.
Koved, Larry ; Nadalin, Anthony J. ; Neal, D. ; et al.
IBM Systems Journal. 1998, Vol. 37 Issue 3, p349. 16p. 3 Diagrams, 5 Charts.

COMPUTER security SECURITY systems JAVA programming languag... JAVA programming languag...
Fachzeitschrift
Zu den Favoriten
87

Teaching Java security to enhance cybersecurity education
Xiaohong Yuan ; Huiming Yu ; Adley Haywood
2013 Proceedings of IEEE Southeastcon. :1-6

4. Education 05 social sciences 0509 other social scienc...
Fachzeitschrift
Zu den Favoriten
88

Java security extensions for a Java server in a hostile environment
D.M. Wheeler ; A. Conyers ; A. Xiong ; et al.
Seventeenth Annual Computer Security Applications Conference. :64-73

0202 electrical engineer... 02 engineering and techn...
Fachzeitschrift
Zu den Favoriten
89

Food Security of Urban Agricultural Households in the Area of North Bandung, West Java, Indonesia
Oekan S. Abdoellah ; Yusep Suparman ; Kinanti Indah Safitri ; et al.
MDPI, Sustainability. 15(24):1-15

Fachzeitschrift
Zu den Favoriten
90

Java Security: A Ten Year Retrospective
Li Gong
2009 Annual Computer Security Applications Conference. :395-405

0202 electrical engineer... 02 engineering and techn...
Fachzeitschrift
Zu den Favoriten
91

CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects
Rahaman, Sazzadur ; Xiao, Ya ; Afrose, Sharmin ; et al.

Computer Science - Crypt...
Report
Zu den Favoriten
92

Java Security Architecture Revisited
LI GONG
Communications of the ACM. 54(11):48-52

Computer science Informatique Sciences exactes et tech... Exact sciences and techn... Sciences appliquees Applied sciences
Fachzeitschrift
Zu den Favoriten
93

Motivational evaluation of food security programs in Central Java, Indonesia
Sutrisno, Joko ; Marwanti, Sri ; Anugrah Putri, Hilda ; et al.
Agricultural and Resource Economics: International Scientific E-Journal, Agricultural and Resource Economics: International Scientific E-Journal. 10(2)

Fachzeitschrift
Zu den Favoriten
94

A model and design of a security provider for Java applications
Gernot Schmolzer ; Abdul Gahafoor Abbasi ; Sead Muftic
2009 International Conference for Internet Technology and Secured Transactions, (ICITST). :1-7

0209 industrial biotechn... 0203 mechanical engineer... 02 engineering and techn...
Fachzeitschrift
Zu den Favoriten
95

SecureCode v2.0: A Production-Grade Dataset for Training Security-Aware Code Generation Models
Thornton, Scott

Cryptography and Securit... Artificial Intelligence Computation and Language Machine Learning
Report
Zu den Favoriten
96

Experiences with embedding MPL security monitors into Java programs
Jari-Matti Mäkelä ; Ville Leppänen
Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing. :1-6

05 social sciences 0202 electrical engineer... 0501 psychology and cogn... 02 engineering and techn...
Fachzeitschrift
Zu den Favoriten
97

QLCoder: A Query Synthesizer For Static Analysis of Security Vulnerabilities
Wang, Claire ; Li, Ziyang ; Dutta, Saikat ; et al.

Cryptography and Securit... Programming Languages Software Engineering
Report
Zu den Favoriten
98

Enabling Dynamic Security Policy in the Java Security Manager.
Fabien Autrel ; Nora Cuppens-Boulahia ; Frédéric Cuppens
FPS. :180-193

Konferenz
Zu den Favoriten
99

Research on NTRU Algorithm for Mobile Java Security
Xiaoyu Shen ; Rong Chen ; Zhenjun Du
2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing. :366-369

0202 electrical engineer... 02 engineering and techn...
Fachzeitschrift
Zu den Favoriten
100

Using reflection as a mechanism for enforcing security policies on compiled code.
Welch, Ian ; Stroud, Robert J.
Journal of Computer Security. 2002, Vol. 10 Issue 4, p399. 34p.

COMPUTER security JAVA programming languag...
Fachzeitschrift
Zu den Favoriten

Filter